SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
PRIORITY BASED BANDWIDTH ALLOCATION IN 
WIRELESS SENSOR NETWORKS 
Mary Cherian1 and T.R. Gopalakrishnan Nair2 
1Department of Computer Science & Engineering, Dr.Ambedkar Institute of Technology, 
Bangalore, India 
2Dayananda Sagar Institutions, Bangalore, India 
ABSTRACT 
Most of the sensor network applications need real time communication and the need for deadline aware 
real time communication is becoming eminent in these applications. These applications have different dead 
line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and 
need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper 
we focus on the MAC layer modifications to meet the real time requirements of different priority data. 
Bandwidth partitioning among different priority transmissions is implemented through MAC layer 
modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower 
priority packets and higher transfer rate for real time packets with higher priority, minimizing the end to 
end delay. The performance of the algorithm is evaluated with varying node distribution. 
KEYWORDS 
Wireless sensor networks, real time, priority of traffic flow, MAC layer, bandwidth allocation 
1. INTRODUCTION 
A wireless sensor network (WSN) comprises of sensor nodes, which monitor the terrain where 
they are deployed and gather the physical environmental parameters which they communicate to 
the base station [1]. The sensor nodes are densely deployed in regions where they monitor many 
physical phenomena such as vibration, movement of objects, temperature, humidity, pressure, 
radiations, noise levels, and light conditions. The sensor nodes self-organize to form an Ad-hoc 
network after the deployment. The sensor nodes are resource constraint as these are equipped 
with batteries with limited power, tiny microprocessors/microcontrollers, low power transceivers, 
and sensors for gathering information about the deployed environment. When a single sensor 
node is limited in its capabilities, the composition of large number of nodes offers technological 
capabilities. In wireless sensor networks, individual sensor nodes are inherently unreliable and 
have very limited capabilities to ensure real-time guarantees. The target is to provide more 
reliable services with reduced end-to-end delays, and lower energy consumption in the underlying 
sensor network. A hard real-time (HRT) system guarantees that critical tasks complete on time 
[2], [3]. Here meeting a deadline is mandatory otherwise system failure occurs which may cause 
catastrophic damage [4]. These systems are implemented as safety critical systems such as in 
aerospace and defence. Performance of such systems cannot be compensated over any other 
feature of the system. A certain amount of latency is allowed for soft-real time solutions. In such 
cases the transferred data is not critical and the system used may use the soft real time solutions 
for directing the information to the sink. These systems are known as non-safety critical systems 
where the system deals with non critical data and use soft real time solutions for data transfer. 
DOI : 10.5121/ijcnc.2014.6609 119
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
The applications of wireless sensor networks spread in different domains viz. military, emergency 
situation management, physical world, medical and health, industry, home network and 
automotive. Most of the sensor network applications need real time communication and the need 
for deadline aware real time communication is becoming eminent in these applications. These 
applications have different dead line requirements also. Some of the challenges for real time 
communication are random deployment, dynamic network topology, traffic characteristics, 
resource constraints, and transient congestion. 
In WSN the sensed data from the nodes may travel multiple paths towards the destination. The 
available bandwidth in the channel will be portioned, and the response times will become very 
lengthy [5]. The real time applications of wireless sensor networks are bandwidth sensitive and 
needs higher share of bandwidth for higher priority data to meet the dead line requirements. 
Through the assistance from MAC layer, the availability of multiple non-interfering and 
prioritized paths can be made available to the routing algorithm. In this paper we focus on the 
MAC layer modifications to achieve the real time requirements of the different priority data. In 
the layered view of a network model the MAC layer should guarantee the channel access delay. 
The network layer routing protocol should bind the end-to-end transmission time [6]. 
The remainder of the paper is organized as follows. Section 2 aims to provide a survey on the 
state of the art of related MAC and routing protocols. Section 3 provides an overview of the 
system. The outcomes of the implemented technique are discussed in section 4. Finally, section 5 
contains some concluding remarks and the potential research directions. 
2. RELATED WORK 
In WSN the MAC layer has an important role in deciding the channel access delay which 
contributes to the end-to end delay. Contention based protocols [6] can reduce the collisions, but a 
deterministic channel access cannot be decided. On the contrary in TDMA based MAC a bounded 
and predictable medium delay can be determined, but a central co-ordination is required [6]. The 
original IEEE 801.11 [7] uses DCF (Distributed Coordination Function) and PCF (Point 
Coordination Function). CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance is 
used for the channel access. If channel is free, it waits for DIFS (Distributed inter frame space) 
and transmits if still free. If channel is busy, it randomly backs off a number of Slots (minimum 
15, maximum 1023). If packet transmission further fails, back-off is increased to a random 
window, up to a preconfigured upper limit. But the access method neither differentiates the 
different priority data nor reserves the bandwidth. PCF is centrally controlled and uses polling. 
The PC (Point Coordinator) maintains the list of nodes eligible for polling. As PCF is not 
compatible with all type of real time data, it is not practically used. 
The protocols described in [6], S-MAC, T-MAC, B-MAC apply CSMA/CA for medium access, 
but they only provide best effort service. 802.11e [8], [9] provides QoS support for wireless 
networks at the MAC layer of the protocol stack and enhances the medium access functions. To 
achieve hard time data delivery of the packets in addition to a HRT MAC layer, a hard real time 
routing protocol is also essential. Taimur Qureshi et al. in [5] present a network Layer based Hard 
Real Time Protocol for wireless sensor networks. But the protocol assumes a MAC (Medium 
Access Control) layer which is collision free and with, known medium access delay. It also does 
not consider the priority of the packets. Other existing real time routing protocols for WSN viz. 
RAP [10], SPEED [11], R2TP [12] do not have a priority based data delivery mechanism. They 
neither consider a queuing model for packet scheduling at the nodes nor allocate the bandwidth 
based on the priority of the packets. 
120
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
We have presented a real time routing protocol, RRDTE in [13] which detects time critical events 
in WSN. But the bandwidth allocation is not addressed in this protocol. In [14], we propose a 
scheduling algorithm for sensor networks based on the packet service ratio which helps in 
congestion control and flow control. But this also does not address the bandwidth partitioning 
based on the priority of the packets. M.Caccamo et al., in [15] propose an implicit prioritized 
access protocol, for deterministic real time communication which demands prior topological 
information and synchronization. However, this is not suitable in non-deterministic environments. 
In I-EDF nodes are organized in hexagonal cells. Each cell will have a unique frequency in intra-cellular 
communication. The six directions of the hexagon are numbered and the communication 
slots alternate with a given direction in inter-cellular communication. The rigid cell-based 
organization of the topology has a limitation in real environment where there is random 
deployment of sensor nodes. 
Watteyne et al. in [16] present a novel hard-real time MAC protocol with realistic assumptions. 
The focus is mainly on the MAC layer, as hard real-time needs to be dealt at each layer in 
communication architectures. The protocol consists of an initialization phase, followed by a 
run-time phase, subdivided in two modes: unprotected and protected mode. Unprotected mode 
is used when collision probability is low and multi-hop propagation speed is near optimal. When 
collision occurs, the network switches to a slower but collision-free protected mode. But the 
protocol works only on linear topologies. This protocol also requires dedicated frequency 
channels. DMAC [6], DR-MAC [6] protocols minimize the communication latency, but they are 
suitable only for specific tree topologies. 
CE. Perkins et al. in [20] presents the AODV, a routing protocol for Ad-Hoc networks, but 
priority based data delivery is not addressed in this protocol also. Iftikhar Ahmad et al. in [21] 
present a routing protocol by improvising the basic routing mechanism in AODV to assign more 
bandwidth to real time traffic (RT), compared to best effort traffic (BE). The protocol reserves a 
larger time slot for transmission of RT traffic than that of BE traffic. The protocol assumes only 
one queue for the buffering of the packets. Here the BE traffic may be starving and may be 
dropped also, if the queue fills up. 
3. OVERVIEWOF THE SYSTEM 
Sensor nodes share the available resources such as transmission bandwidth, buffer storage and the 
processing capability. The delay and loss performance can be quantified as explained in this 
subsection. When a packet or connection request arrives at a node, the node may be in a blocking 
state because of the unavailability of the resources. The data packets arrive at a node in a random 
manner; the time that they spend in the node is also random. Due to lack of resources, the packets 
may get blocked or lost. Throughput of the system is the long-term departure rate from the 
system. The average arrival rate is given by the inverse of the average inter arrival time. Little’s 
formula[17] can be applied to a networking scenario also in which the system can be a network 
node, transmission line, multiplexer, a switch or a network itself [18]. 
121 
3.1. Priority queuing at the node 
A queuing model is considered at the nodes where requests can belong to one of N priority 
classes. When a packet arrives at the system, it joins the queue of its priority class. Each time one 
packet is fetched, from the queue, the next packet to be served is selected from the head of the 
line of the highest priority non empty queue. It is assumed that the arrival at each priority class is 
Poisson with rate in and that the average service time of a class N customers is E [sn]. So the load 
offered by class N is, ρn = in E [sn] where ρ is the utilization factor.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
122 
The highest priority class (class 0) has average waiting time 
E [W0] = (in E [s^2]) ∕ (1 – ρ0) (1) 
So E [W0] saturates as ρ approaches 1. Thus the saturation point of class 0 is determined only by 
its own load. On the other hand, the waiting time for class 1 is given 
By 
E [W1] = (in E [s ^2]) ∕ (1 – ρ0) (1 – ρ0 – ρ1) (2) 
The class 1 queue will saturate when ρ0 + ρ1 approaches 1. Thus the class 1 queue saturation 
point is affected by the class 0 load. Similarly, the class N queue saturation point depends on the 
sum of the loads of the classes of priority up to N. 
At the MAC layer Enhanced Distributed Channel Access (EDCA) method is used. Advantage 
here is that this allows ‘tuning’ of the parameters for any specific network/application. Four 
priority categories are Class 0, Class 1, Class 2, and Class 3 with Class 0 having the highest 
priority. Each Access Category is equipped with a single transmit queue as depicted in Figure 1. 
Table 1 Packet Priority Classes 
Class Priority Traffic Type 
3 Priority 3 Normal- low priority periodic data 
2 Priority 2 Control data 
1 Priority 1 Real-Time data 
0 Priority 0 Real-Time critical data(Lowest Delay) 
The MAC layer service data unit (MSDU) with UP (user priorities) which is transferred from the 
higher layer (network layer) is mapped, and subsequently placed in the corresponding priority 
queue. This ensures bandwidth partitioning among different priority transmissions.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
123 
MSDU with UP 
Mapping of MSDU to Specific Priority 
Class 0 Class 1 Class 2 Class3 
Figure 1. Queues with Different Priorities 
The routing protocol applied is the hard real time protocol for wireless sensor networks (RPS) 
which is a multipath routing protocol. Protocol discovers disjoint paths. However, the RPS 
algorithm is based on the computation of dynamic routes and can handle the dynamic changes of 
the networks. Delay as the metric, a source node selects its route dynamically and checks the 
quality of the alternative routes. 
4. SIMULATION RESULTS AND DISCUSSIONS 
In this work, we consider the bandwidth allocation based on priority of the data for the 
applications where sensor nodes are deployed in Ad-hoc manner to detect critical events. We 
have applied the discrete event simulator (NS-2) [19] to model the behaviour of the application. 
The nature of the events generated in the system is stochastic, discrete, and dynamic. 
A single base station gathers data from the sensor nodes. The simulations are conducted with 32, 
64,128, and 256 nodes. The wireless sensor nodes are deployed with random topology in terrains 
ranging in sizes from 500meter x 500meter to 1500meter x 1500meter. The enhanced 802.11e 
EDCA is employed at the MAC layer. Traffic with different priorities is generated by the 
application. The bandwidth allocated to each priority data is estimated based on the simulation 
results. The results of simulation with NS-2 simulator are charted below.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
Figurers 2 to 5 indicate the bandwidth allocations for different priority data for node distributions 
for 32, 64, 128, and 256 nodes respectively. Figure 2 depicts the simulation results with the 
number of sensor nodes as 256. The Class 0 (Priority 0) traffic with the highest priority (Table 1) 
gets the highest share of bandwidth and the Class 3 (Priority 3) traffic gets the lowest share of 
bandwidth. This in turn ensures that the highest priority packets are delivered with minimum 
delay meeting the critical data delivery requirements. 
124 
Figure 2. Bandwidth allocations for different priority data for 256 nodes 
Figure 3. Bandwidth allocations for different priority data for 128 nodes
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
125 
Figure 4. Bandwidth allocations for different priority data for 64 nodes 
Figure 5. Bandwidth allocations for different priority data for 32 nodes 
Figures 3, 4, 5 indicate the results of bandwidth allocation with 128, 64 and 32 nodes 
respectively. The simulation results with 128, 64 and 32 nodes are consistent with the result of 
256 nodes. The percentage of bandwidth allocated for higher priority data is higher. The critical 
data which is event driven data [22], can be delivered with minimum delay meeting the 
requirements of the application.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
126 
Figure 6. End-to-End Delay 
In figure 6 we are comparing the end-to end delay of packet delivery in our method with the 
end-to end delay incurred in transmission of data packets with the AODV [20] protocol for 
priority 0, the critical data. AODV is an on-demand routing protocol which is widely used for 
wireless networks. This protocol has less routing and computational overheads, simplicity, and 
good scalability. But the protocol does not consider QoS or reliability as demanded by the traffic 
[21]. AODV does not differentiate the packets with different priority. AODV applies random 
packet scheduling [23]. The end-to end delay incurred in our protocol is less than that of AODV 
protocol as indicated by the graph in figure 6. The real time critical data is assigned the highest 
share of bandwith and hence is delivered with minimum dealy. 
5. CONCLUSION 
This paper details the priority based data delivery to the sink node from the sensor nodes. In this 
work, we consider the bandwidth allocation based on the priority of the data for the applications 
where sensor nodes are deployed in Ad-hoc manner to detect critical events. The data generated 
in WSN has different priority levels. WSNs are application specific and several applications of 
WSN are designed for vital event monitoring and to ensure timeliness and reliability for the 
measured environmental values [13]. The real time data has to be prioritized based on the urgency 
and resources such as bandwidth needs to be allocated accordingly to ensure the timely delivery 
of the data to the sink node. The bandwidth allocation for each flow depends on the QoS 
requirement of the specific flow [24]. The MAC layer implements priority based medium access, 
and queuing mechanism, which ensures the critical data delivery in a prioritized manner with 
bandwidth partitioning among different priority transmissions. We have applied the discrete 
event simulator (NS-2) to model the behavior of the system. Simulation has been conducted for 
different node distributions. The results are compared with similar known technique. Our 
technique reduces end-to end delay in data delivery as depicted in figure 6. Future research 
direction of this work could be an enhancement to support load balancing. We have considered a 
static base station and nodes in this work. Studies may be further extended for scenarios 
considering the mobility of the sink, the sensor nodes or both.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
127 
REFERENCES 
[1] I.F. Akyildiz et al., “Wireless Sensor Networks: A Survey,” Journal of Computer Networks, vol.38, 
no.4, pp. 393-422, Mar. 2002. 
[2] Jane W.S. Liu, “Priority – Driven Scheduling of Periodic Tasks,” in Real Time Systems, pp. 133- 
134, Pearson Education Publishers 8th reprint, 2000. 
[3] H. Peng et al., “An adaptive real-time routing scheme for wireless sensor networks,” in Proc. of 
IEEE Advanced Information Networking and Applications Workshops, pp.918 – 922, Niagara Falls, 
Ont. , Canada, 2007. 
[4] M. Cherian and T. R G. Nair, “A Deadline Aware Real-time Routing Protocol for Wireless Sensor 
Networks,” International journal of Innovative Systems Design and Engineering, vol.2, no.4, pp.336- 
349, Sept. 2011. 
[5] T Qureshi and D.A.Zighed, “Proposition and Simulation of a Network Layer based Hard Real time 
Protocol for Wireless Sensor Networks,” in Proc. of IEEE Mobile and Wireless Communications 
Summit, pp. 1-5, Budapest, Hungary, 2007. 
[6] Yanjun Li et al., “Real-time QoS support in wireless sensor networks: a survey ,”in Proc. of 7th 
IFAC International Conference on Fieldbuses & Networks in Industrial & Embedded Systems - 
FeT’2007, pp. 46-60, France, 2007. 
[7] B.A. Forouzan, “Wireless LANs” in Data Communications and Networking, Tata McGraw-Hill 4th 
ed., pp. 423-434, 2010. 
[8] M. Lacage et al., “IEEE 802.11 rate adaptation: a practical approach,” in Proc. of 7th ACM 
international symposium on Modeling, analysis and simulation of wireless and mobile systems 
(MSWiM), pp. 126–134, ACM Press, New York, USA, 2004. 
[9] IEEE Computer Society LAN/MAN Standards Committee, “Wireless LAN Medium Access 
Control and Physical Layer Specifications-IEEE 802.11 Part-11,” pp.1-513, 2003. 
[10] C. Lu et al., “RAP: A Real-time Communication Architecture for Large-Scale Wireless Sensor 
Networks,” in Proc. of 8th IEEE Real-Time and Embedded Technology and Applications Symposium 
(RTAS’ 02), pp.55-66, San Jose, CA, USA, 2002. 
[11] T. He et al., “Speed: A stateless protocol for real-time communication in sensor networks,” in Proc. of 
23rd IEEE International Conference on Distributed Computing Systems (ICDCS ‘03), pp. 46-60, 
Rhode Island, USA, 2003. 
[12] Kim and P. S. Joon, “Reliable and real time data dissemination in Wireless Sensor Networks,” in 
Proc. of IEEE MILCOM, pp.1-5, San Diego, CA, 2008. 
[13] M. Cherian and T. R G. Nair, “A Real Time Routing Protocol for Detection of Time Critical Events 
in Wireless Sensor Networks,” International Journal of Scientific and Engineering Research, vol. 4, 
no .9,pp. 462-468, Sept. 2013. 
[14] M. Cherian and T. R. G. Nair,“A Priority based Scheduling technique for Multipath Routing in 
Wireless Sensor Networks,” in Proc.of International conference on Communication and Broadband 
Networking ( ICCBN 2011), pp. 925-932, Kuala Lumpur, Malaysia, Jun. 2011. 
[15] M.Caccamo et al., “An implicit prioritized access protocol for wireless sensor networks”, in Proc. of 
23rd IEEE Real Time System Symposium (RTSS ’02) , pp. 39-48, Austin, Texas, USA,2002. 
[16] T. Watteyne and I. Augé-Blum, “Proposition of a Hard Real-Time MAC Protocol for Wireless Sensor 
Networks, ” in Proc. of 13th IEEE International Symposium on Modeling, Analysis, and Simulation 
of Computer and Telecommunication Systems (MASCOTS’05),pp. 533 – 536, Atlanta, Georgia,2005. 
[17] J. Banks et al., “Appendix A,” in Discrete-Event System Simulation, pp. 840-859, Pearson Education 
Publishers 4th ed., 2007. 
[18] H. Peng et al., “An adaptive real-time routing scheme for wireless sensor networks,” in Proc. of 
IEEE Advanced Information Networking and Applications Workshops, pp.918 – 922, Niagara Falls, 
Ont. , Canada, 2007. 
[19] The ns-2 Network Simulator. Available at http://www.isi.edu/nsnam/ns/ 
[20] CE. Perkins and EM. Royer, “Ad hoc on-demand distance vector routing,” in the Proc. of IEEE 
Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90-100 , New Orleans, 
LA, 1999. 
[21] Iftikhar Ahmad et al., “Improved quality of service protocol for real time traffic in manet”, 
International Journal of Computer Networks & Communications (IJCNC) , vol.5, no.4, pp.75-86, July 
2013.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 
[22] Sukumar Nandi and Aditya Yadav, “Cross Layer Adaptation for QoS in WSN”, International Journal 
128 
of Computer Networks & Communications (IJCNC), vol.3, no.5, pp.287-301, September, 2011. 
[23] Elham Karimi and Behzad Akbari, “Priority scheduling for multipath video transmission in 
WMSNS”, International Journal of Computer Networks & Communications (IJCNC), vol.5, no.6, 
pp.167-180, November, 2013. 
[24] M. Cherian and T. R G. Nair, “A QoS-Aware Routing Protocol for Real-time Applications in 
WirelessSensor Networks,” International journal of Innovative Systems Design and Engineering, 
vol.2, no.7, pp.84-93, Dec. 2011. 
AUTHORS 
Mary Cherian has 30 years of experience in professional field spread over education, 
research and industry. She holds B.E degree in electronics and communication from 
Kerala University, India and M.Tech. in computer science and engineering from 
Visvesvaraya technological university Belgaum, India. She started her career in 1984 as a 
research engineer in O/E/N India and has worked in the field of engineering and software 
in industries like Kerala state electronics Development Corporation, Keltron controls, 
Electronics Research and Development Centre, ABB and Chemtrols Software private 
limited in capacities of System Engineer, System Manager and Director. Later, she concentrated on 
education and contributed in academic field for the last 15 years in India and abroad educating pupil in the 
field of science and technology especially in Computer Science and Engineering. Currently she is working 
as Associate Professor in the department of Computer Science and Engineering in Dr. Ambedkar Institute 
of Technology, Bangalore, India. She has publications in national and international conferences and 
journals. Her areas of interests include Computer networks, Sensor Networks, Real time routing protocols, 
and Cognitive routing. Prof Cherian has membership of professional bodies such as CSI, ISTE, IE and 
IETE. 
Dr. T. R. Gopalakrishnan Nair has 35 years of experience in professional field spread over 
education, research and industry. He holds degrees M.Tech. from I.I.Sc., Bangalore, India 
and Ph.D. in computer Science, from Kerala University, India. He started his career in 
Electronics Research and Development Centre, Trivandrum, India where he was 
instrumental in developing various pioneering research products in the field of computers 
and software. Later, as the head of Advanced Simulation Activities in Indian Space 
Research Organization, his areas of research were Critical Real-Time Systems, Inertial Navigation and 
Guidance systems, Launch Vehicle Technology, High speed computing and Launch Vehicle simulations. 
Later, he concentrated on education and contributed extensively in academic field for the last 14 years in 
India and abroad educating pupil in the field of science and technology especially in Computer Science and 
Engineering. He authored and published about 110 papers in these multidisciplinary fields and he promotes 
cross domain fusion of knowledge. He has authored several book chapters at international levels and 
delivered keynote and invited lectures. He is the Chief Editor of Journals "Inter JRI Science and 
Technology and Inter JRI Computer Science and Networking” published by Interline Publishers. In 1992, 
he received the National Technology award PARAM from the advisor to Prime Minister, for developing 
the parallel computing flight simulation systems. He received the Team Tech Foundation Award for 
'Excellence in Education and Research' in 2009. Dr. Nair is a senior member of IEEE for last two decades 
and a member of various other societies like ACM. His areas of interests include Computer networks, 
Cognitive routing, Software Engineering, Bio-Informatics, AI & Robotics and Signal and Image 
Processing.

More Related Content

What's hot

PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
IJCNCJournal
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
IDES Editor
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
ijwmn
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
IRJET Journal
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
IJECEIAES
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
Mukundhan Elumalai
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
INFOGAIN PUBLICATION
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
ijsrd.com
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
IRJET Journal
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
pijans
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
ijcses
 
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKSA NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
IJCNCJournal
 

What's hot (19)

PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
 
B0781013215
B0781013215B0781013215
B0781013215
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Ant
AntAnt
Ant
 
ant2
ant2ant2
ant2
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKSA NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
 

Viewers also liked

Performance improvement for papr reduction in lte downlink system with ellipt...
Performance improvement for papr reduction in lte downlink system with ellipt...Performance improvement for papr reduction in lte downlink system with ellipt...
Performance improvement for papr reduction in lte downlink system with ellipt...
IJCNCJournal
 
Intrusion preventionintrusion detection
Intrusion preventionintrusion detectionIntrusion preventionintrusion detection
Intrusion preventionintrusion detection
IJCNCJournal
 
A survey of models for computer networks management
A survey of models for computer networks managementA survey of models for computer networks management
A survey of models for computer networks management
IJCNCJournal
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
IJCNCJournal
 
Solving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataSolving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing data
IJCNCJournal
 
Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...
IJCNCJournal
 
A STUDY ON IMPACTS OF RTT INACCURACY ON DYNAMIC BANDWIDTH ALLOCATION IN PON A...
A STUDY ON IMPACTS OF RTT INACCURACY ON DYNAMIC BANDWIDTH ALLOCATION IN PON A...A STUDY ON IMPACTS OF RTT INACCURACY ON DYNAMIC BANDWIDTH ALLOCATION IN PON A...
A STUDY ON IMPACTS OF RTT INACCURACY ON DYNAMIC BANDWIDTH ALLOCATION IN PON A...
IJCNCJournal
 
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IJCNCJournal
 
Performance analysis and monitoring of various advanced digital modulation an...
Performance analysis and monitoring of various advanced digital modulation an...Performance analysis and monitoring of various advanced digital modulation an...
Performance analysis and monitoring of various advanced digital modulation an...
IJCNCJournal
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
IJCNCJournal
 
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
IJCNCJournal
 
A general stochastic information diffusion model in social networks based on ...
A general stochastic information diffusion model in social networks based on ...A general stochastic information diffusion model in social networks based on ...
A general stochastic information diffusion model in social networks based on ...
IJCNCJournal
 
On the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environmentOn the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environment
IJCNCJournal
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
IJCNCJournal
 
ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO
ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIOENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO
ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO
IJCNCJournal
 
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
IJCNCJournal
 
Virtual backbone trees for most minimal
Virtual backbone trees for most minimalVirtual backbone trees for most minimal
Virtual backbone trees for most minimal
IJCNCJournal
 
Zigbee technology and its application in
Zigbee technology and its application inZigbee technology and its application in
Zigbee technology and its application in
IJCNCJournal
 

Viewers also liked (18)

Performance improvement for papr reduction in lte downlink system with ellipt...
Performance improvement for papr reduction in lte downlink system with ellipt...Performance improvement for papr reduction in lte downlink system with ellipt...
Performance improvement for papr reduction in lte downlink system with ellipt...
 
Intrusion preventionintrusion detection
Intrusion preventionintrusion detectionIntrusion preventionintrusion detection
Intrusion preventionintrusion detection
 
A survey of models for computer networks management
A survey of models for computer networks managementA survey of models for computer networks management
A survey of models for computer networks management
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
 
Solving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataSolving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing data
 
Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...
 
A STUDY ON IMPACTS OF RTT INACCURACY ON DYNAMIC BANDWIDTH ALLOCATION IN PON A...
A STUDY ON IMPACTS OF RTT INACCURACY ON DYNAMIC BANDWIDTH ALLOCATION IN PON A...A STUDY ON IMPACTS OF RTT INACCURACY ON DYNAMIC BANDWIDTH ALLOCATION IN PON A...
A STUDY ON IMPACTS OF RTT INACCURACY ON DYNAMIC BANDWIDTH ALLOCATION IN PON A...
 
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
 
Performance analysis and monitoring of various advanced digital modulation an...
Performance analysis and monitoring of various advanced digital modulation an...Performance analysis and monitoring of various advanced digital modulation an...
Performance analysis and monitoring of various advanced digital modulation an...
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
 
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
 
A general stochastic information diffusion model in social networks based on ...
A general stochastic information diffusion model in social networks based on ...A general stochastic information diffusion model in social networks based on ...
A general stochastic information diffusion model in social networks based on ...
 
On the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environmentOn the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environment
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
 
ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO
ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIOENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO
ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO
 
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
 
Virtual backbone trees for most minimal
Virtual backbone trees for most minimalVirtual backbone trees for most minimal
Virtual backbone trees for most minimal
 
Zigbee technology and its application in
Zigbee technology and its application inZigbee technology and its application in
Zigbee technology and its application in
 

Similar to Priority based bandwidth allocation in wireless sensor networks

Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
IJERA Editor
 
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEY
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEYREAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEY
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEY
cscpconf
 
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
IJNSA Journal
 
C0351725
C0351725C0351725
C0351725
iosrjournals
 
Ijnsa050212
Ijnsa050212Ijnsa050212
Ijnsa050212
IJNSA Journal
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
IJCNCJournal
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
IJCNCJournal
 
Ttacca
TtaccaTtacca
Ttacca
csandit
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
cscpconf
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
ijwmn
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
International Journal of Technical Research & Application
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
Alexander Decker
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
IOSR Journals
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127IJMER
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
IJMER
 
Br33421423
Br33421423Br33421423
Br33421423
IJERA Editor
 
Br33421423
Br33421423Br33421423
Br33421423
IJERA Editor
 

Similar to Priority based bandwidth allocation in wireless sensor networks (20)

Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEY
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEYREAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEY
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEY
 
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
 
C0351725
C0351725C0351725
C0351725
 
Ijnsa050212
Ijnsa050212Ijnsa050212
Ijnsa050212
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Ttacca
TtaccaTtacca
Ttacca
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 
Br33421423
Br33421423Br33421423
Br33421423
 
Br33421423
Br33421423Br33421423
Br33421423
 

More from IJCNCJournal

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 

More from IJCNCJournal (20)

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 

Recently uploaded

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
iemerc2024
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 

Recently uploaded (20)

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 

Priority based bandwidth allocation in wireless sensor networks

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 PRIORITY BASED BANDWIDTH ALLOCATION IN WIRELESS SENSOR NETWORKS Mary Cherian1 and T.R. Gopalakrishnan Nair2 1Department of Computer Science & Engineering, Dr.Ambedkar Institute of Technology, Bangalore, India 2Dayananda Sagar Institutions, Bangalore, India ABSTRACT Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper we focus on the MAC layer modifications to meet the real time requirements of different priority data. Bandwidth partitioning among different priority transmissions is implemented through MAC layer modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower priority packets and higher transfer rate for real time packets with higher priority, minimizing the end to end delay. The performance of the algorithm is evaluated with varying node distribution. KEYWORDS Wireless sensor networks, real time, priority of traffic flow, MAC layer, bandwidth allocation 1. INTRODUCTION A wireless sensor network (WSN) comprises of sensor nodes, which monitor the terrain where they are deployed and gather the physical environmental parameters which they communicate to the base station [1]. The sensor nodes are densely deployed in regions where they monitor many physical phenomena such as vibration, movement of objects, temperature, humidity, pressure, radiations, noise levels, and light conditions. The sensor nodes self-organize to form an Ad-hoc network after the deployment. The sensor nodes are resource constraint as these are equipped with batteries with limited power, tiny microprocessors/microcontrollers, low power transceivers, and sensors for gathering information about the deployed environment. When a single sensor node is limited in its capabilities, the composition of large number of nodes offers technological capabilities. In wireless sensor networks, individual sensor nodes are inherently unreliable and have very limited capabilities to ensure real-time guarantees. The target is to provide more reliable services with reduced end-to-end delays, and lower energy consumption in the underlying sensor network. A hard real-time (HRT) system guarantees that critical tasks complete on time [2], [3]. Here meeting a deadline is mandatory otherwise system failure occurs which may cause catastrophic damage [4]. These systems are implemented as safety critical systems such as in aerospace and defence. Performance of such systems cannot be compensated over any other feature of the system. A certain amount of latency is allowed for soft-real time solutions. In such cases the transferred data is not critical and the system used may use the soft real time solutions for directing the information to the sink. These systems are known as non-safety critical systems where the system deals with non critical data and use soft real time solutions for data transfer. DOI : 10.5121/ijcnc.2014.6609 119
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 The applications of wireless sensor networks spread in different domains viz. military, emergency situation management, physical world, medical and health, industry, home network and automotive. Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. Some of the challenges for real time communication are random deployment, dynamic network topology, traffic characteristics, resource constraints, and transient congestion. In WSN the sensed data from the nodes may travel multiple paths towards the destination. The available bandwidth in the channel will be portioned, and the response times will become very lengthy [5]. The real time applications of wireless sensor networks are bandwidth sensitive and needs higher share of bandwidth for higher priority data to meet the dead line requirements. Through the assistance from MAC layer, the availability of multiple non-interfering and prioritized paths can be made available to the routing algorithm. In this paper we focus on the MAC layer modifications to achieve the real time requirements of the different priority data. In the layered view of a network model the MAC layer should guarantee the channel access delay. The network layer routing protocol should bind the end-to-end transmission time [6]. The remainder of the paper is organized as follows. Section 2 aims to provide a survey on the state of the art of related MAC and routing protocols. Section 3 provides an overview of the system. The outcomes of the implemented technique are discussed in section 4. Finally, section 5 contains some concluding remarks and the potential research directions. 2. RELATED WORK In WSN the MAC layer has an important role in deciding the channel access delay which contributes to the end-to end delay. Contention based protocols [6] can reduce the collisions, but a deterministic channel access cannot be decided. On the contrary in TDMA based MAC a bounded and predictable medium delay can be determined, but a central co-ordination is required [6]. The original IEEE 801.11 [7] uses DCF (Distributed Coordination Function) and PCF (Point Coordination Function). CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance is used for the channel access. If channel is free, it waits for DIFS (Distributed inter frame space) and transmits if still free. If channel is busy, it randomly backs off a number of Slots (minimum 15, maximum 1023). If packet transmission further fails, back-off is increased to a random window, up to a preconfigured upper limit. But the access method neither differentiates the different priority data nor reserves the bandwidth. PCF is centrally controlled and uses polling. The PC (Point Coordinator) maintains the list of nodes eligible for polling. As PCF is not compatible with all type of real time data, it is not practically used. The protocols described in [6], S-MAC, T-MAC, B-MAC apply CSMA/CA for medium access, but they only provide best effort service. 802.11e [8], [9] provides QoS support for wireless networks at the MAC layer of the protocol stack and enhances the medium access functions. To achieve hard time data delivery of the packets in addition to a HRT MAC layer, a hard real time routing protocol is also essential. Taimur Qureshi et al. in [5] present a network Layer based Hard Real Time Protocol for wireless sensor networks. But the protocol assumes a MAC (Medium Access Control) layer which is collision free and with, known medium access delay. It also does not consider the priority of the packets. Other existing real time routing protocols for WSN viz. RAP [10], SPEED [11], R2TP [12] do not have a priority based data delivery mechanism. They neither consider a queuing model for packet scheduling at the nodes nor allocate the bandwidth based on the priority of the packets. 120
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 We have presented a real time routing protocol, RRDTE in [13] which detects time critical events in WSN. But the bandwidth allocation is not addressed in this protocol. In [14], we propose a scheduling algorithm for sensor networks based on the packet service ratio which helps in congestion control and flow control. But this also does not address the bandwidth partitioning based on the priority of the packets. M.Caccamo et al., in [15] propose an implicit prioritized access protocol, for deterministic real time communication which demands prior topological information and synchronization. However, this is not suitable in non-deterministic environments. In I-EDF nodes are organized in hexagonal cells. Each cell will have a unique frequency in intra-cellular communication. The six directions of the hexagon are numbered and the communication slots alternate with a given direction in inter-cellular communication. The rigid cell-based organization of the topology has a limitation in real environment where there is random deployment of sensor nodes. Watteyne et al. in [16] present a novel hard-real time MAC protocol with realistic assumptions. The focus is mainly on the MAC layer, as hard real-time needs to be dealt at each layer in communication architectures. The protocol consists of an initialization phase, followed by a run-time phase, subdivided in two modes: unprotected and protected mode. Unprotected mode is used when collision probability is low and multi-hop propagation speed is near optimal. When collision occurs, the network switches to a slower but collision-free protected mode. But the protocol works only on linear topologies. This protocol also requires dedicated frequency channels. DMAC [6], DR-MAC [6] protocols minimize the communication latency, but they are suitable only for specific tree topologies. CE. Perkins et al. in [20] presents the AODV, a routing protocol for Ad-Hoc networks, but priority based data delivery is not addressed in this protocol also. Iftikhar Ahmad et al. in [21] present a routing protocol by improvising the basic routing mechanism in AODV to assign more bandwidth to real time traffic (RT), compared to best effort traffic (BE). The protocol reserves a larger time slot for transmission of RT traffic than that of BE traffic. The protocol assumes only one queue for the buffering of the packets. Here the BE traffic may be starving and may be dropped also, if the queue fills up. 3. OVERVIEWOF THE SYSTEM Sensor nodes share the available resources such as transmission bandwidth, buffer storage and the processing capability. The delay and loss performance can be quantified as explained in this subsection. When a packet or connection request arrives at a node, the node may be in a blocking state because of the unavailability of the resources. The data packets arrive at a node in a random manner; the time that they spend in the node is also random. Due to lack of resources, the packets may get blocked or lost. Throughput of the system is the long-term departure rate from the system. The average arrival rate is given by the inverse of the average inter arrival time. Little’s formula[17] can be applied to a networking scenario also in which the system can be a network node, transmission line, multiplexer, a switch or a network itself [18]. 121 3.1. Priority queuing at the node A queuing model is considered at the nodes where requests can belong to one of N priority classes. When a packet arrives at the system, it joins the queue of its priority class. Each time one packet is fetched, from the queue, the next packet to be served is selected from the head of the line of the highest priority non empty queue. It is assumed that the arrival at each priority class is Poisson with rate in and that the average service time of a class N customers is E [sn]. So the load offered by class N is, ρn = in E [sn] where ρ is the utilization factor.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 122 The highest priority class (class 0) has average waiting time E [W0] = (in E [s^2]) ∕ (1 – ρ0) (1) So E [W0] saturates as ρ approaches 1. Thus the saturation point of class 0 is determined only by its own load. On the other hand, the waiting time for class 1 is given By E [W1] = (in E [s ^2]) ∕ (1 – ρ0) (1 – ρ0 – ρ1) (2) The class 1 queue will saturate when ρ0 + ρ1 approaches 1. Thus the class 1 queue saturation point is affected by the class 0 load. Similarly, the class N queue saturation point depends on the sum of the loads of the classes of priority up to N. At the MAC layer Enhanced Distributed Channel Access (EDCA) method is used. Advantage here is that this allows ‘tuning’ of the parameters for any specific network/application. Four priority categories are Class 0, Class 1, Class 2, and Class 3 with Class 0 having the highest priority. Each Access Category is equipped with a single transmit queue as depicted in Figure 1. Table 1 Packet Priority Classes Class Priority Traffic Type 3 Priority 3 Normal- low priority periodic data 2 Priority 2 Control data 1 Priority 1 Real-Time data 0 Priority 0 Real-Time critical data(Lowest Delay) The MAC layer service data unit (MSDU) with UP (user priorities) which is transferred from the higher layer (network layer) is mapped, and subsequently placed in the corresponding priority queue. This ensures bandwidth partitioning among different priority transmissions.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 123 MSDU with UP Mapping of MSDU to Specific Priority Class 0 Class 1 Class 2 Class3 Figure 1. Queues with Different Priorities The routing protocol applied is the hard real time protocol for wireless sensor networks (RPS) which is a multipath routing protocol. Protocol discovers disjoint paths. However, the RPS algorithm is based on the computation of dynamic routes and can handle the dynamic changes of the networks. Delay as the metric, a source node selects its route dynamically and checks the quality of the alternative routes. 4. SIMULATION RESULTS AND DISCUSSIONS In this work, we consider the bandwidth allocation based on priority of the data for the applications where sensor nodes are deployed in Ad-hoc manner to detect critical events. We have applied the discrete event simulator (NS-2) [19] to model the behaviour of the application. The nature of the events generated in the system is stochastic, discrete, and dynamic. A single base station gathers data from the sensor nodes. The simulations are conducted with 32, 64,128, and 256 nodes. The wireless sensor nodes are deployed with random topology in terrains ranging in sizes from 500meter x 500meter to 1500meter x 1500meter. The enhanced 802.11e EDCA is employed at the MAC layer. Traffic with different priorities is generated by the application. The bandwidth allocated to each priority data is estimated based on the simulation results. The results of simulation with NS-2 simulator are charted below.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 Figurers 2 to 5 indicate the bandwidth allocations for different priority data for node distributions for 32, 64, 128, and 256 nodes respectively. Figure 2 depicts the simulation results with the number of sensor nodes as 256. The Class 0 (Priority 0) traffic with the highest priority (Table 1) gets the highest share of bandwidth and the Class 3 (Priority 3) traffic gets the lowest share of bandwidth. This in turn ensures that the highest priority packets are delivered with minimum delay meeting the critical data delivery requirements. 124 Figure 2. Bandwidth allocations for different priority data for 256 nodes Figure 3. Bandwidth allocations for different priority data for 128 nodes
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 125 Figure 4. Bandwidth allocations for different priority data for 64 nodes Figure 5. Bandwidth allocations for different priority data for 32 nodes Figures 3, 4, 5 indicate the results of bandwidth allocation with 128, 64 and 32 nodes respectively. The simulation results with 128, 64 and 32 nodes are consistent with the result of 256 nodes. The percentage of bandwidth allocated for higher priority data is higher. The critical data which is event driven data [22], can be delivered with minimum delay meeting the requirements of the application.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 126 Figure 6. End-to-End Delay In figure 6 we are comparing the end-to end delay of packet delivery in our method with the end-to end delay incurred in transmission of data packets with the AODV [20] protocol for priority 0, the critical data. AODV is an on-demand routing protocol which is widely used for wireless networks. This protocol has less routing and computational overheads, simplicity, and good scalability. But the protocol does not consider QoS or reliability as demanded by the traffic [21]. AODV does not differentiate the packets with different priority. AODV applies random packet scheduling [23]. The end-to end delay incurred in our protocol is less than that of AODV protocol as indicated by the graph in figure 6. The real time critical data is assigned the highest share of bandwith and hence is delivered with minimum dealy. 5. CONCLUSION This paper details the priority based data delivery to the sink node from the sensor nodes. In this work, we consider the bandwidth allocation based on the priority of the data for the applications where sensor nodes are deployed in Ad-hoc manner to detect critical events. The data generated in WSN has different priority levels. WSNs are application specific and several applications of WSN are designed for vital event monitoring and to ensure timeliness and reliability for the measured environmental values [13]. The real time data has to be prioritized based on the urgency and resources such as bandwidth needs to be allocated accordingly to ensure the timely delivery of the data to the sink node. The bandwidth allocation for each flow depends on the QoS requirement of the specific flow [24]. The MAC layer implements priority based medium access, and queuing mechanism, which ensures the critical data delivery in a prioritized manner with bandwidth partitioning among different priority transmissions. We have applied the discrete event simulator (NS-2) to model the behavior of the system. Simulation has been conducted for different node distributions. The results are compared with similar known technique. Our technique reduces end-to end delay in data delivery as depicted in figure 6. Future research direction of this work could be an enhancement to support load balancing. We have considered a static base station and nodes in this work. Studies may be further extended for scenarios considering the mobility of the sink, the sensor nodes or both.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 127 REFERENCES [1] I.F. Akyildiz et al., “Wireless Sensor Networks: A Survey,” Journal of Computer Networks, vol.38, no.4, pp. 393-422, Mar. 2002. [2] Jane W.S. Liu, “Priority – Driven Scheduling of Periodic Tasks,” in Real Time Systems, pp. 133- 134, Pearson Education Publishers 8th reprint, 2000. [3] H. Peng et al., “An adaptive real-time routing scheme for wireless sensor networks,” in Proc. of IEEE Advanced Information Networking and Applications Workshops, pp.918 – 922, Niagara Falls, Ont. , Canada, 2007. [4] M. Cherian and T. R G. Nair, “A Deadline Aware Real-time Routing Protocol for Wireless Sensor Networks,” International journal of Innovative Systems Design and Engineering, vol.2, no.4, pp.336- 349, Sept. 2011. [5] T Qureshi and D.A.Zighed, “Proposition and Simulation of a Network Layer based Hard Real time Protocol for Wireless Sensor Networks,” in Proc. of IEEE Mobile and Wireless Communications Summit, pp. 1-5, Budapest, Hungary, 2007. [6] Yanjun Li et al., “Real-time QoS support in wireless sensor networks: a survey ,”in Proc. of 7th IFAC International Conference on Fieldbuses & Networks in Industrial & Embedded Systems - FeT’2007, pp. 46-60, France, 2007. [7] B.A. Forouzan, “Wireless LANs” in Data Communications and Networking, Tata McGraw-Hill 4th ed., pp. 423-434, 2010. [8] M. Lacage et al., “IEEE 802.11 rate adaptation: a practical approach,” in Proc. of 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM), pp. 126–134, ACM Press, New York, USA, 2004. [9] IEEE Computer Society LAN/MAN Standards Committee, “Wireless LAN Medium Access Control and Physical Layer Specifications-IEEE 802.11 Part-11,” pp.1-513, 2003. [10] C. Lu et al., “RAP: A Real-time Communication Architecture for Large-Scale Wireless Sensor Networks,” in Proc. of 8th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS’ 02), pp.55-66, San Jose, CA, USA, 2002. [11] T. He et al., “Speed: A stateless protocol for real-time communication in sensor networks,” in Proc. of 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ‘03), pp. 46-60, Rhode Island, USA, 2003. [12] Kim and P. S. Joon, “Reliable and real time data dissemination in Wireless Sensor Networks,” in Proc. of IEEE MILCOM, pp.1-5, San Diego, CA, 2008. [13] M. Cherian and T. R G. Nair, “A Real Time Routing Protocol for Detection of Time Critical Events in Wireless Sensor Networks,” International Journal of Scientific and Engineering Research, vol. 4, no .9,pp. 462-468, Sept. 2013. [14] M. Cherian and T. R. G. Nair,“A Priority based Scheduling technique for Multipath Routing in Wireless Sensor Networks,” in Proc.of International conference on Communication and Broadband Networking ( ICCBN 2011), pp. 925-932, Kuala Lumpur, Malaysia, Jun. 2011. [15] M.Caccamo et al., “An implicit prioritized access protocol for wireless sensor networks”, in Proc. of 23rd IEEE Real Time System Symposium (RTSS ’02) , pp. 39-48, Austin, Texas, USA,2002. [16] T. Watteyne and I. Augé-Blum, “Proposition of a Hard Real-Time MAC Protocol for Wireless Sensor Networks, ” in Proc. of 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS’05),pp. 533 – 536, Atlanta, Georgia,2005. [17] J. Banks et al., “Appendix A,” in Discrete-Event System Simulation, pp. 840-859, Pearson Education Publishers 4th ed., 2007. [18] H. Peng et al., “An adaptive real-time routing scheme for wireless sensor networks,” in Proc. of IEEE Advanced Information Networking and Applications Workshops, pp.918 – 922, Niagara Falls, Ont. , Canada, 2007. [19] The ns-2 Network Simulator. Available at http://www.isi.edu/nsnam/ns/ [20] CE. Perkins and EM. Royer, “Ad hoc on-demand distance vector routing,” in the Proc. of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90-100 , New Orleans, LA, 1999. [21] Iftikhar Ahmad et al., “Improved quality of service protocol for real time traffic in manet”, International Journal of Computer Networks & Communications (IJCNC) , vol.5, no.4, pp.75-86, July 2013.
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 [22] Sukumar Nandi and Aditya Yadav, “Cross Layer Adaptation for QoS in WSN”, International Journal 128 of Computer Networks & Communications (IJCNC), vol.3, no.5, pp.287-301, September, 2011. [23] Elham Karimi and Behzad Akbari, “Priority scheduling for multipath video transmission in WMSNS”, International Journal of Computer Networks & Communications (IJCNC), vol.5, no.6, pp.167-180, November, 2013. [24] M. Cherian and T. R G. Nair, “A QoS-Aware Routing Protocol for Real-time Applications in WirelessSensor Networks,” International journal of Innovative Systems Design and Engineering, vol.2, no.7, pp.84-93, Dec. 2011. AUTHORS Mary Cherian has 30 years of experience in professional field spread over education, research and industry. She holds B.E degree in electronics and communication from Kerala University, India and M.Tech. in computer science and engineering from Visvesvaraya technological university Belgaum, India. She started her career in 1984 as a research engineer in O/E/N India and has worked in the field of engineering and software in industries like Kerala state electronics Development Corporation, Keltron controls, Electronics Research and Development Centre, ABB and Chemtrols Software private limited in capacities of System Engineer, System Manager and Director. Later, she concentrated on education and contributed in academic field for the last 15 years in India and abroad educating pupil in the field of science and technology especially in Computer Science and Engineering. Currently she is working as Associate Professor in the department of Computer Science and Engineering in Dr. Ambedkar Institute of Technology, Bangalore, India. She has publications in national and international conferences and journals. Her areas of interests include Computer networks, Sensor Networks, Real time routing protocols, and Cognitive routing. Prof Cherian has membership of professional bodies such as CSI, ISTE, IE and IETE. Dr. T. R. Gopalakrishnan Nair has 35 years of experience in professional field spread over education, research and industry. He holds degrees M.Tech. from I.I.Sc., Bangalore, India and Ph.D. in computer Science, from Kerala University, India. He started his career in Electronics Research and Development Centre, Trivandrum, India where he was instrumental in developing various pioneering research products in the field of computers and software. Later, as the head of Advanced Simulation Activities in Indian Space Research Organization, his areas of research were Critical Real-Time Systems, Inertial Navigation and Guidance systems, Launch Vehicle Technology, High speed computing and Launch Vehicle simulations. Later, he concentrated on education and contributed extensively in academic field for the last 14 years in India and abroad educating pupil in the field of science and technology especially in Computer Science and Engineering. He authored and published about 110 papers in these multidisciplinary fields and he promotes cross domain fusion of knowledge. He has authored several book chapters at international levels and delivered keynote and invited lectures. He is the Chief Editor of Journals "Inter JRI Science and Technology and Inter JRI Computer Science and Networking” published by Interline Publishers. In 1992, he received the National Technology award PARAM from the advisor to Prime Minister, for developing the parallel computing flight simulation systems. He received the Team Tech Foundation Award for 'Excellence in Education and Research' in 2009. Dr. Nair is a senior member of IEEE for last two decades and a member of various other societies like ACM. His areas of interests include Computer networks, Cognitive routing, Software Engineering, Bio-Informatics, AI & Robotics and Signal and Image Processing.